Brief description: The password encryption algorithm of the auto-Recharge software is too simple.
Detailed Description: the automatic recharge software of jie.com encrypts the user login password and stores it in the config. ini file under the Software Directory. the encryption algorithm is too simple, making the User Password vulnerable to cracking.
Proof of vulnerability:
Nb sa fa Rb cc AB Lb ld Nd 9a
Mb ta ea Qb dc Bb Kb kd Md 8a
Lb qa ha Pb ac 8b Nb nd Ld 7a
Kb ra ga Ob bc 9b Mb md Kd 6a
Rb wa ba Vb Yb Eb Hb hd Rd Da
Qb xa aa Ub Zb Fb Gb gd Qd Ca
Pb ua da Tb Wb Cb Jb jd Pd Ba
Ob va ca Sb Xb Db Ib id Od Aa
Fb 0a na Zb Ub Ib Db td Fd Ha
Eb 1a ma Yb Vb Jb Cb sd Ed Ga
The above are the ciphertext corresponding to passwords 0-9 with 1-10 digits respectively.
For example, if the password is 0123456789, the ciphertext is nbtahaObYbFbJbidFdGa.
The ciphertext algorithm loops every 10 bits, that is, when password 1 is at 1st bits and at 11th bits, the corresponding password is the same
This algorithm can quickly crack the ciphertext. Due to the time relationship, only the ciphertext corresponding to the digital password is found. The algorithm of letters is the same as that of numbers.
Solution: change the password encryption algorithm